{"id":"https://openalex.org/W2905178740","doi":"https://doi.org/10.1007/978-3-030-05063-4_30","title":"An Efficient Multi-keyword Searchable Encryption Supporting Multi-user Access Control","display_name":"An Efficient Multi-keyword Searchable Encryption Supporting Multi-user Access Control","publication_year":2018,"publication_date":"2018-01-01","ids":{"openalex":"https://openalex.org/W2905178740","doi":"https://doi.org/10.1007/978-3-030-05063-4_30","mag":"2905178740"},"language":"en","primary_location":{"id":"doi:10.1007/978-3-030-05063-4_30","is_oa":false,"landing_page_url":"https://doi.org/10.1007/978-3-030-05063-4_30","pdf_url":null,"source":{"id":"https://openalex.org/S106296714","display_name":"Lecture notes in computer science","issn_l":"0302-9743","issn":["0302-9743","1611-3349"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Lecture Notes in Computer Science","raw_type":"book-chapter"},"type":"book-chapter","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5023986604","display_name":"Chuxin Wu","orcid":"https://orcid.org/0000-0003-0180-1734"},"institutions":[{"id":"https://openalex.org/I4210152380","display_name":"Shenzhen Technology University","ror":"https://ror.org/04qzpec27","country_code":"CN","type":"education","lineage":["https://openalex.org/I4210152380"]},{"id":"https://openalex.org/I180726961","display_name":"Shenzhen University","ror":"https://ror.org/01vy4gh70","country_code":"CN","type":"education","lineage":["https://openalex.org/I180726961"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Chuxin Wu","raw_affiliation_strings":["ATR Key Laboratory of National Defense Technology, College of Information Engineering, Shenzhen University, Shenzhen, 518060, Guangdong, China","ATR Key Laboratory of National Defense Technology, College of Information Engineering, Shenzhen University, Shenzhen, China"],"affiliations":[{"raw_affiliation_string":"ATR Key Laboratory of National Defense Technology, College of Information Engineering, Shenzhen University, Shenzhen, 518060, Guangdong, China","institution_ids":["https://openalex.org/I4210152380","https://openalex.org/I180726961"]},{"raw_affiliation_string":"ATR Key Laboratory of National Defense Technology, College of Information Engineering, Shenzhen University, Shenzhen, China","institution_ids":["https://openalex.org/I4210152380","https://openalex.org/I180726961"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101949155","display_name":"Peng Zhang","orcid":"https://orcid.org/0000-0001-7721-2675"},"institutions":[{"id":"https://openalex.org/I180726961","display_name":"Shenzhen University","ror":"https://ror.org/01vy4gh70","country_code":"CN","type":"education","lineage":["https://openalex.org/I180726961"]},{"id":"https://openalex.org/I4210152380","display_name":"Shenzhen Technology University","ror":"https://ror.org/04qzpec27","country_code":"CN","type":"education","lineage":["https://openalex.org/I4210152380"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Peng Zhang","raw_affiliation_strings":["ATR Key Laboratory of National Defense Technology, College of Information Engineering, Shenzhen University, Shenzhen, 518060, Guangdong, China","ATR Key Laboratory of National Defense Technology, College of Information Engineering, Shenzhen University, Shenzhen, China"],"affiliations":[{"raw_affiliation_string":"ATR Key Laboratory of National Defense Technology, College of Information Engineering, Shenzhen University, Shenzhen, 518060, Guangdong, China","institution_ids":["https://openalex.org/I4210152380","https://openalex.org/I180726961"]},{"raw_affiliation_string":"ATR Key Laboratory of National Defense Technology, College of Information Engineering, Shenzhen University, Shenzhen, China","institution_ids":["https://openalex.org/I4210152380","https://openalex.org/I180726961"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100411952","display_name":"Hongwei Liu","orcid":"https://orcid.org/0000-0002-6298-5875"},"institutions":[{"id":"https://openalex.org/I180726961","display_name":"Shenzhen University","ror":"https://ror.org/01vy4gh70","country_code":"CN","type":"education","lineage":["https://openalex.org/I180726961"]},{"id":"https://openalex.org/I4210152380","display_name":"Shenzhen Technology University","ror":"https://ror.org/04qzpec27","country_code":"CN","type":"education","lineage":["https://openalex.org/I4210152380"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Hongwei Liu","raw_affiliation_strings":["ATR Key Laboratory of National Defense Technology, College of Information Engineering, Shenzhen University, Shenzhen, 518060, Guangdong, China","Shenzhen Technology University, Shenzhen, 518118, Guangdong, China","ATR Key Laboratory of National Defense Technology, College of Information Engineering, Shenzhen University, Shenzhen, China","Shenzhen Technology University, Shenzhen, China"],"affiliations":[{"raw_affiliation_string":"ATR Key Laboratory of National Defense Technology, College of Information Engineering, Shenzhen University, Shenzhen, 518060, Guangdong, China","institution_ids":["https://openalex.org/I4210152380","https://openalex.org/I180726961"]},{"raw_affiliation_string":"Shenzhen Technology University, Shenzhen, 518118, Guangdong, China","institution_ids":["https://openalex.org/I4210152380"]},{"raw_affiliation_string":"ATR Key Laboratory of National Defense Technology, College of Information Engineering, Shenzhen University, Shenzhen, China","institution_ids":["https://openalex.org/I4210152380","https://openalex.org/I180726961"]},{"raw_affiliation_string":"Shenzhen Technology University, Shenzhen, China","institution_ids":["https://openalex.org/I4210152380"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5056307475","display_name":"Zehong Chen","orcid":"https://orcid.org/0000-0001-8852-5167"},"institutions":[{"id":"https://openalex.org/I180726961","display_name":"Shenzhen University","ror":"https://ror.org/01vy4gh70","country_code":"CN","type":"education","lineage":["https://openalex.org/I180726961"]},{"id":"https://openalex.org/I4210152380","display_name":"Shenzhen Technology University","ror":"https://ror.org/04qzpec27","country_code":"CN","type":"education","lineage":["https://openalex.org/I4210152380"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Zehong Chen","raw_affiliation_strings":["ATR Key Laboratory of National Defense Technology, College of Information Engineering, Shenzhen University, Shenzhen, 518060, Guangdong, China","ATR Key Laboratory of National Defense Technology, College of Information Engineering, Shenzhen University, Shenzhen, China"],"affiliations":[{"raw_affiliation_string":"ATR Key Laboratory of National Defense Technology, College of Information Engineering, Shenzhen University, Shenzhen, 518060, Guangdong, China","institution_ids":["https://openalex.org/I4210152380","https://openalex.org/I180726961"]},{"raw_affiliation_string":"ATR Key Laboratory of National Defense Technology, College of Information Engineering, Shenzhen University, Shenzhen, China","institution_ids":["https://openalex.org/I4210152380","https://openalex.org/I180726961"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5008190964","display_name":"Zoe L. Jiang","orcid":"https://orcid.org/0000-0002-8944-7444"},"institutions":[{"id":"https://openalex.org/I204983213","display_name":"Harbin Institute of Technology","ror":"https://ror.org/01yqg2h08","country_code":"CN","type":"education","lineage":["https://openalex.org/I204983213"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Zoe L. Jiang","raw_affiliation_strings":["Harbin Institute of Technology, Shenzhen, 518055, Guangdong, China","Harbin Institute of Technology, Shenzhen, China"],"affiliations":[{"raw_affiliation_string":"Harbin Institute of Technology, Shenzhen, 518055, Guangdong, China","institution_ids":["https://openalex.org/I204983213"]},{"raw_affiliation_string":"Harbin Institute of Technology, Shenzhen, China","institution_ids":["https://openalex.org/I204983213"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5101949155"],"corresponding_institution_ids":["https://openalex.org/I180726961","https://openalex.org/I4210152380"],"apc_list":{"value":5000,"currency":"EUR","value_usd":5392},"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.18424566,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"389","last_page":"398"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10720","display_name":"Complexity and Algorithms in Graphs","score":0.9896000027656555,"subfield":{"id":"https://openalex.org/subfields/1703","display_name":"Computational Theory and Mathematics"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9484999775886536,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8843185901641846},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.8112180233001709},{"id":"https://openalex.org/keywords/security-token","display_name":"Security token","score":0.7473919987678528},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.6418151259422302},{"id":"https://openalex.org/keywords/access-control","display_name":"Access control","score":0.6017565131187439},{"id":"https://openalex.org/keywords/outsourcing","display_name":"Outsourcing","score":0.5600945353507996},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.39192062616348267},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.3790687918663025},{"id":"https://openalex.org/keywords/database","display_name":"Database","score":0.3714612126350403},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.14884382486343384}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8843185901641846},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.8112180233001709},{"id":"https://openalex.org/C48145219","wikidata":"https://www.wikidata.org/wiki/Q1335365","display_name":"Security token","level":2,"score":0.7473919987678528},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.6418151259422302},{"id":"https://openalex.org/C527821871","wikidata":"https://www.wikidata.org/wiki/Q228502","display_name":"Access control","level":2,"score":0.6017565131187439},{"id":"https://openalex.org/C46934059","wikidata":"https://www.wikidata.org/wiki/Q61515","display_name":"Outsourcing","level":2,"score":0.5600945353507996},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.39192062616348267},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.3790687918663025},{"id":"https://openalex.org/C77088390","wikidata":"https://www.wikidata.org/wiki/Q8513","display_name":"Database","level":1,"score":0.3714612126350403},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.14884382486343384},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.0},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1007/978-3-030-05063-4_30","is_oa":false,"landing_page_url":"https://doi.org/10.1007/978-3-030-05063-4_30","pdf_url":null,"source":{"id":"https://openalex.org/S106296714","display_name":"Lecture notes in computer science","issn_l":"0302-9743","issn":["0302-9743","1611-3349"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Lecture Notes in Computer Science","raw_type":"book-chapter"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":16,"referenced_works":["https://openalex.org/W1502708590","https://openalex.org/W1532961226","https://openalex.org/W1873520610","https://openalex.org/W1979493600","https://openalex.org/W2099739670","https://openalex.org/W2108072891","https://openalex.org/W2122590785","https://openalex.org/W2144754501","https://openalex.org/W2147929033","https://openalex.org/W2477329965","https://openalex.org/W2520286728","https://openalex.org/W2589174826","https://openalex.org/W2739149093","https://openalex.org/W2766749922","https://openalex.org/W2789622866","https://openalex.org/W2952868726"],"related_works":["https://openalex.org/W2358200898","https://openalex.org/W4231184955","https://openalex.org/W2325765407","https://openalex.org/W2788012436","https://openalex.org/W618293728","https://openalex.org/W2291845669","https://openalex.org/W200604156","https://openalex.org/W2374784346","https://openalex.org/W4286615217","https://openalex.org/W3154723744"],"abstract_inverted_index":null,"counts_by_year":[],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
